VARINDIA, in collaboration with Kaspersky, successfully hosted an exclusive event, "Technology Next: Cybersecurity Redefined," at the prestigious Hotel Hyatt Regency, Kolkata. The event brought together industry leaders, cybersecurity experts, and IT professionals to discuss the evolving landscape of cybersecurity and emerging technological advancements.
The evening commenced with a welcome address by Dr. Deepak Kumar Sahu, Editor-in-Chief of VARINDIA. This set the stage for a series of insightful presentations and discussions from prominent figures in the industry.
The welcome address was followed by the inaugural address by Dr. Sandip Pradhan, VP-IT & CIO, Exide Industries Ltd. President-CIO Klub-Kolkata who shared his insights on the current state of IT and cybersecurity in the industry. The keynote address by Sanjay Kumar Das, Additional Secretary & State Information Security Officer, Govt. of West Bengal and M.D.-WEBEL delved into the crucial role of state-level cybersecurity measures and the strategic initiatives being undertaken in West Bengal. Gaurav Bhatnagar and Mukesh Dagar from Kaspersky provided their expert perspectives on enterprise cybersecurity solutions and pre-sales strategies, respectively.
The event also featured an interactive Q&A session, allowing attendees to engage with the speakers and gain deeper insights into the topics discussed. The evening concluded with a vote of thanks by Piyush Verma, Partner Account Manager at Kaspersky, expressing gratitude to all participants and attendees for their contributions.
Sanjay Kumar Das
Additional Secretary & State Information Security Officer, Govt. of West Bengal and M.D, WEBEL
The greatest disadvantage that we are facing is the increased number of connected devices. We have crossed the threshold of ensuring endpoint security. At present I am connected through multiple devices to the web and different clouds. Solution providers are looking beyond endpoints to address security concerns. Most of the terrorists or bad persons are being tracked by following how they connect to the cloud to update their Endpoint Security Solutions. Every endpoint security solution comes into the cloud and gets updated. As soon as it is updated, it is actually logging the location and from that the criminal is identified. So, the endpoint security not only secures but also exposes people. So, we need to think about how to secure exposure rather than end points.
Dr. Sandip Pradhan
VP-IT & CIO, Exide Industries Ltd. President, CIO Klub-Kolkata
To gauge an organization's security maturity, several parameters should be examined, including tools and techniques such as endpoint security, network security, Information Security Office (ISO) and center, email access control, SAP mobile device management, and document classification (public, private, confidential). We also consider extended detection and response (XDR), unification, and cultural change and simulation, which hold significant importance, with 95% of daily trading activities relying on these factors. Regular intervals of average study, role-based training, security awareness programs, monthly IT magazines, separate cyber accounts, and third-party training (including vendors and third-party employees) are essential.
Dr. Deepak Kumar Sahu
Editor-in-Chief, VARINDIA
As we delve into discussions on digital transformation, emerging technologies, and their applications across various sectors, let us actively engage, exchange knowledge, and build networks that will drive our industries forward. Your presence signifies a collective commitment to harnessing the power of technology to create sustainable and innovative solutions. Our world is changing. Client business needs are evolving, processes are shifting, and trends are impacting not only how clients think about their industries and customers but also how they run their businesses. We have transitioned from exploring the potential of the internet to leveraging AI, starting from the ground up.
Mukesh Dagar
Pre Sales Manager, Kaspersky
The cybersecurity ecosystem has emerged from the basic computers to high-end computing, from servers to Kubernetes and containers. And above all, we have Security Solutions to protect each and every layer.
The reason behind putting all of those controls in place is to protect the business critical data. But the fact is that digitalization is directly proportional to the attack surface; no matter what tools you place, it is going to increase your attack surface. So understanding from an IT team perspective, first they need to understand the new layer which has emerged and then think about the security of that particular layer. So every new security tool or asset introduced into an environment is actually increasing the attack surface.
Gaurav Bhatnagar
Head of Enterprise Business, Kaspersky
Being Kaspersky, we always look at the complete posture of cyber security. In the cybersecurity landscape we talk about looking at the complete posture of the cybersecurity element. It should be combined with the complete compliances. Kaspersky always helps customers to get step-by-step compliances and it should be your compromise assessment that helps to check applications. Next is Red teaming which is a very important aspect because it gives the power of simulation. So, Kaspersky helps customers to do the simulation. Last is incident response that gives a caution of reliability that someone is behind you if something went wrong with the network or if something spectacular has been noticed in the network or in the data center, you can call and ask to check. Kaspersky has a 24x7 team that responds within one hour and gives the complete root cause analysis.
See What’s Next in Tech With the Fast Forward Newsletter
Tweets From @varindiamag
Nothing to see here - yet
When they Tweet, their Tweets will show up here.